<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identify unused ACLs and object groups in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065107#M895135</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I know there are some recommended practices allow you to summarize and simplify your ACE entries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)Use contiguous host addresses whenever possible. Aggegrate host statements in ACEs/object-groups into networks.&lt;/P&gt;&lt;P&gt;2)Use 'any' instead of networks, and use networks instead of hosts when possible.&lt;/P&gt;&lt;P&gt;3)Try to simplify object-groups. This can potentially save hundreds of ACEs when the ACLs are expanded.&lt;/P&gt;&lt;P&gt;4)Group together individual port statements into a range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Oct 2008 15:04:47 GMT</pubDate>
    <dc:creator>bwilmoth</dc:creator>
    <dc:date>2008-10-17T15:04:47Z</dc:date>
    <item>
      <title>Identify unused ACLs and object groups</title>
      <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065106#M895134</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Can anyone point me to a software product (preferably Cisco) that will analyze a PIX 6.3 firewall rule set and determine which ACLs are not in use and which object groups are not referenced by any ACLs?  I know I can show access-list to see hit counts, but this firewall has thousands of rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;    Matt&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065106#M895134</guid>
      <dc:creator>MATTHEW BECK</dc:creator>
      <dc:date>2019-03-11T13:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Identify unused ACLs and object groups</title>
      <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065107#M895135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I know there are some recommended practices allow you to summarize and simplify your ACE entries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)Use contiguous host addresses whenever possible. Aggegrate host statements in ACEs/object-groups into networks.&lt;/P&gt;&lt;P&gt;2)Use 'any' instead of networks, and use networks instead of hosts when possible.&lt;/P&gt;&lt;P&gt;3)Try to simplify object-groups. This can potentially save hundreds of ACEs when the ACLs are expanded.&lt;/P&gt;&lt;P&gt;4)Group together individual port statements into a range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Oct 2008 15:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065107#M895135</guid>
      <dc:creator>bwilmoth</dc:creator>
      <dc:date>2008-10-17T15:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Identify unused ACLs and object groups</title>
      <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065108#M895138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh access-list | inc hitcnt=0&lt;/P&gt;&lt;P&gt;enter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will only give the non-matched lines. &lt;/P&gt;&lt;P&gt;dump the results into excel with the ( as a text delimiter. This will clip off the hitcnt=0) 0x15abbe7c from the end of the lines. The drop it into notepad and you can replace "access-list" with "no access-list"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Oct 2008 19:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065108#M895138</guid>
      <dc:creator>josh</dc:creator>
      <dc:date>2008-10-17T19:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: Identify unused ACLs and object groups</title>
      <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065109#M895140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Actually, that won't work with object groups like I have configured.  When you do the show access-list command you get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l YYY line 1 perm...&lt;/P&gt;&lt;P&gt;access-l YYY line 1 perm...&lt;/P&gt;&lt;P&gt;access-l YYY line 1 perm...&lt;/P&gt;&lt;P&gt;access-l YYY line 2 perm...&lt;/P&gt;&lt;P&gt;access-l YYY line 2 perm...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I try to no out anything but the first line which includes the name of the object groups, I'm going to get an error.  And I definitely don't want to delete the entire line because only 1 object in the group may be unused - the rest will be valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, and enjoy your weekend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Oct 2008 20:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065109#M895140</guid>
      <dc:creator>MATTHEW BECK</dc:creator>
      <dc:date>2008-10-17T20:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: Identify unused ACLs and object groups</title>
      <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065110#M895144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the access-lists you could do it manually like the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firsto do a:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-l | inc elements&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then compare it with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Oct 2008 05:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065110#M895144</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-10-19T05:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Identify unused ACLs and object groups</title>
      <link>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065111#M895146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've done this before and it was VERY painful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what i did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Use a freeware tool call odumper/ofiller,&lt;/P&gt;&lt;P&gt;written by a Checkpoint engineer to dump&lt;/P&gt;&lt;P&gt;the rules and object into a Checkpoint &lt;/P&gt;&lt;P&gt;SmartCenter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- In the Checkpoint security, I can use the&lt;/P&gt;&lt;P&gt;"right-click" functions to findout which &lt;/P&gt;&lt;P&gt;objects have NOT been used.  This can be &lt;/P&gt;&lt;P&gt;relatively quickly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- Use Cisco conversion tool to convert&lt;/P&gt;&lt;P&gt;Checkpoint rule back into Pix rules.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 and 2 worked quite well but step&lt;/P&gt;&lt;P&gt;3 was a big mess especially when you have&lt;/P&gt;&lt;P&gt;a large security policy.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my 2c.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Oct 2008 09:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identify-unused-acls-and-object-groups/m-p/1065111#M895146</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-19T09:33:43Z</dc:date>
    </item>
  </channel>
</rss>

